Vocabulary Flashcards
access control
Sum of all the technologies, process and personnel that are responsible for controlling access to resources
account deprovisioning
the process of removing access and disabling an account when a user no longer requires access to cloud resources
account hijacking
an occurrence when an unauthorized party gains access to and takes over a privileged account
account provisioning
the process of creating user accounts and enabling access to cloud resources
address allocation
the process of assigning one or multiple IP address to a cloud resource; this can be done either dynamically or statically
adverse event
an event that comes with negative consequences
aggregate risk
the combined risk of multiple individual security flows or vulnerabilities
agile
an SDLC methodology in which development and testing activities occur simultaneously, cyclically and iteratively
anonymization
the process of removing information that can be used to identify a special individual from a dataset
Application Programming Interface (API)
a software-to-software communication link that allows two applications, such as a client and a server, to interact with one another over the Internet
application virtualiation
the process of encapsulating (or bundling) an application into a self-contained package that is isolated from the underlying operating system on which it is executed
applistructure
includes the applications that are deployed in the cloud and the underlying services used to build them
artificial intelligence (AI)
the field devoted to helping machines process things in a smart manner; AI involves giving machines the ability to imitate intelligent human behavior
asymmetric-key (public-key) encryption
a form of encryption that operates by using two keys one public and one private
audit planning
conducted at the very beginning of the audit process and includes all the steps necessary to ensure the audit is conducted thoroughly, effectively and in a timely fashion
audit report
a set of documents and artifacts that describe the findings from an audit and explain the audit’s opinion of the system that was examined
audit scope
a set statement that identifies the focus, boundary and extent of an audit
audit scope restrictions
a set of restrictions on what an auditor may and may not audit
authentication
the process of validating a user’s identity
authenticator
things used to verify a user’s identity
authorization
the process of granting access to a user based on their authenticated identity and the policies you’ve set for them
availability
security principle focused on ensuring that authorized users can access required data when and where they need it
availability management
the process of ensuring that the appropriate people, processes and systems are in place in order to sustain sufficient service availability
bandwidth allocation
the process of sharing network resources fairly between multiple users that share the cloud network
Bastion host
a system that runs outside your security zone that is generally designed to serve a single purpose (such as connecting to the management zone) and has been extremely hardened for enhanced security
block box testing
a software testing method in which the internal design of the component being tested is not known by the tester
blockchain
a string of digital information that is chained together by cryptography; each block of information contains a cryptographic has of the pervious block, transaction data and a timestamp
breakout attack
a hypervisor security flaw that can allow one guest to break out of their virtual machine and manipulate the hypervisor in order to gain access to other cloud tenants
broad network access
the cloud characteristic that suggests that cloud computing should make resources and data ubiquitous and easily accessed when and where they’re required
broken authentication
a vulnerability that allows an attacker to capture or bypass an application’s authentication mechanisms; broken authentication allows the attacker to assume the identity of the attacked user, thus granting the attacker the same privileges as that user
Building Management System (BMS)
a hardware and software control system that is used to control and monitor a building’s electrical mechanical and HVAC systems
business continuity (BC)
the policies, procedures and tools you put in place to ensure critical business functions continue during and after a disaster or crisis
Canadian digital privacy act
a 2015 Canadian regulation that served as a major update to the long-standing Personal Information Protection and Electronic Documents Act (PIPEDA)
capacity management
the process of ensuring that the required resource capacity exists, at all times, to meet or exceed business and customer needs, as defined in SLAs
cardholder data
a specific subset of PII that is related to holders of credit or debit cards
chain of custody
the process of maintaining and documenting the chronological sequence of possession and control of physical or electronic evidence, from creation until its final use (often presentation in court)
change management
an IT discipline focused on ensuring that organizations employ standardized processes and procedures to make changes to their systems and services
checksum
a value derived from a piece of data that uniquely identifies that data and is used to detect changes that might have been introduced during storage or transmission
cia triad
the three primary security principles: confidentiality, integrity and availability
client-side kms
a key management service that is provided by the CSP, but the customer generates, holds and manages the keys
cloud access security broker (CASB)
a software application that sits between cloud users and cloud services and applications, while actively monitoring all cloud usage and implementing centralized controls to enforce security
cloud application
an application that is accessed via the Internet rather than installed and accessed locally
cloud auditor
a cloud service partner who is responsible for conducting an audit of the use of cloud services; the audit may be for general security hygiene, but is often for legal or compliance purposes
cloud service
capabilities made available to a cloud user by a cloud provider through a published interface (a management console or command line, for example)
Cloud Controls Matrix (CCM)
a meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations; published by the Cloud Security Alliance
cloud data portability
the ability to easily move data from one cloud provider to another
cloud deployment model
the way in which cloud services are made available through specific configurations that control the sharing of cloud resources with cloud users; the cloud deployment models are public, private, community and hybrid
cloud resources
compute, storage and networking capabilities that a cloud provider shares with a cloud user
cloud service broker
a cloud service partner who negotiates relationships between cloud service providers and cloud service customers
cloud service category
a collection of cloud services that share a common set of features or qualities; cloud service categories are labelled XaaS; the most common cloud service categories are IaaS, PaaS and SaaS
cloud service customer
a person or group that is in a business relationship to provision and use cloud services from a cloud service provider
cloud service customer data
any data objects under the control of the cloud service customer that were input to the cloud service by the cloud customer or generated by the cloud service on behalf of the cloud customer
cloud service derived data
any data objects under the control of the cloud service provider that were derived by interaction of the cloud customer with the cloud service; may include access logs, utilization information and other forms of metadata (data about data)
cloud service partner
a person or group that supports the provision, use or other activities of the cloud service provider, the cloud service customer or both
cloud service provider (CS)
an entity making cloud services available for use
cloud service provider data
any data objects related to the operation of the cloud service that are fully under the control of the cloud service provider; may include cloud service operational data, information generated by the cloud service provider to provide services, and similar data not owned or related to any specific cloud customer
cloud service user
a person or entity (which may be a device, for example) that uses cloud services on behalf of the cloud service customer